CVE-2022-24883

Publication date 26 April 2022

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

9.8 · Critical

Score breakdown

FreeRDP is a free implementation of the Remote Desktop Protocol (RDP). Prior to version 2.7.0, server side authentication against a `SAM` file might be successful for invalid credentials if the server has configured an invalid `SAM` file path. FreeRDP based clients are not affected. RDP server implementations using FreeRDP to authenticate against a `SAM` file are affected. Version 2.7.0 contains a fix for this issue. As a workaround, use custom authentication via `HashCallback` and/or ensure the `SAM` database path configured is valid and the application has file handles left.

Status

Package Ubuntu Release Status
freerdp 18.04 LTS bionic
Needs evaluation
16.04 LTS xenial
Needs evaluation
freerdp2 24.10 oracular
Not affected
24.04 LTS noble
Not affected
23.10 mantic
Not affected
23.04 lunar
Not affected
22.10 kinetic
Not affected
22.04 LTS jammy
Fixed 2.6.1+dfsg1-3ubuntu2.1
21.10 impish
Fixed 2.3.0+dfsg1-2ubuntu0.2
20.04 LTS focal
Fixed 2.2.0+dfsg1-0ubuntu0.20.04.3
18.04 LTS bionic
Fixed 2.2.0+dfsg1-0ubuntu0.18.04.3

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
freerdp2

Severity score breakdown

Parameter Value
Base score 9.8 · Critical
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H